[Guidelines] [Review Home] [List submissions] [Change Password] [Documentation]

Watch List for Mia Hamm

rev'ed pref w.avg status watch
3 (3.3) [MR] 1. On Obfuscating Point Functions
1 (5.7) [AC] 2. Logcrypt: Forward Security and Public Verification for Secure Audit Logs
1 (1.1) [RE] 3. Cryptanalysis of Hiji-bij-bij (HBB)
2 (4.2) [AC] 4. Benes and Butterfly schemes revisited
x 2 (4) [MA] 5. A sufficient condition for key-privacy
2 (3.9) [DI] 6. A Metric on the Set of Elliptic Curves over ${mathbf F}_p$.
3 (*) [RE] 7. The Misuse of RC4 in Microsoft Word and Excel
3 (4.6) [MA] 8. Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004
2 (5) [AC] 9. Mixing properties of triangular feedback shift registers
2 (3.7) [MA] 10. Update on SHA-1
2 (2.1) [MR] 11. An Improved Elegant Method to Re-initialize Hash Chains
2 (5.1) [MA] 12. Efficient Certificateless Public Key Encryption
3 (5.5) [AC] 13. Comments: Insider attack on Cheng et al.s pairing-based tripartite key agreement protocols
3 (3.3) [MA] 14. A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words
3 (3.9) [DI] 15. Hierarchical Identity Based Encryption with Constant Size Ciphertext
x 3 (4.1) [MA] 16. Narrow T-functions
2 (2.6) [MR] 17. Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives
2 (3.4) [DI] 18. Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
1 (5.4) [AC] 19. The Full Abstraction of the UC Framework
1 (4) [DI] 20. (De)Compositions of Cryptographic Schemes and their Applications to Protocols
3 (3.2) [DI] 21. Partial Hiding in Public-Key Cryptography
1 (3.4) [DI] 22. An Improved and Efficient Countermeasure against Power Analysis Attacks
3 (2.3) [MR] 23. A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness
2 (3.1) [MR] 24. On the Diffie-Hellman problem over $GL_{n}$
2 (4.1) [MA] 25. Analysis of Affinely Equivalent Boolean Functions
3 (5.2) [MA] 26. Techniques for random maskin in hardware
x 4 (4.8) [AC] 27. Tag-KEM/DEM: A New Framework for Hybrid Encryption
3 (4.1) [MR] 28. Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
3 (3.5) [DI] 29. A model and architecture for pseudo-random generation with applications to /dev/random
3 (2.9) [MR] 30. Weak keys of pairing based Diffie Hellman schemes on elliptic curves
3 (4.1) [MA] 31. The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves
3 (2.7) [MR] 32. On the Notion of Statistical Security in Simulatability Definitions
3 (2.8) [RE] 33. A Flexible Framework for Secret Handshakes
3 (3.2) [RE] 34. An Efficient CDH-based Signature Scheme With a Tight Security Reduction
3 (3.8) [DI] 35. Concurrent Composition of Secure Protocols in the Timing Model
3 (4) [DI] 36. Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes
4 (3.1) [DI] 37. Distinguishing Stream Ciphers with Convolutional Filters
3 (3.2) [MR] 38. Unfairness of a protocol for certified delivery
3 (4.2) [MA] 39. On the Security of a Group Signature Scheme with Strong Separability
3 (4.7) [MA] 40. Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications
3 (2.6) [MR] 41. An Efficient Solution to The Millionaires Problem Based on Homomorphic Encryption
3 (3.8) [DI] 42. On the affine classification of cubic bent functions
2 (4.5) [MA] 43. Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3
2 (3.2) [DI] 44. New Approaches for Deniable Authentication
2 (4.7) [AC] 45. Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme
2 (5.4) [AC] 46. Cryptanalysis of two identification schemes based on an ID-based cryptosystem
2 (4.5) [MA] 47. Adversarial Model for Radio Frequency Identification
2 (3.1) [MR] 48. David Chaum's Voter Verification using Encrypted Paper Receipts
2 (1.5) [RE] 49. A Note on Shor's Quantum Algorithm for Prime Factorization
1 (2.6) [MR] 50. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems
3 (3.7) [RE] 51. An Approach Towards Rebalanced RSA-CRT with Short Public Exponent
4 (4.3) [DI] 53. Untraceability of Two Group Signature Schemes
5 (4) [MA] 54. Key Derivation and Randomness Extraction
3 (2.6) [MR] 101. A sufficient condition for key-privacy
Send me email whenever a new message is posted to any submission on my watch list
Use the same ordering for the watch list on my review homepage as in the submission-list page
(clearing this checkbox means that ordering on the homepage is always by submission number)

[Guidelines] [Review Home] [List submissions] [Change Password] [Documentation]